General

  • Target

    1cefb6e3871357bd629d39e4533a04c19ad3418807eae9487d5fb8c28bdfc202N

  • Size

    3.2MB

  • Sample

    241021-x55e8ssblc

  • MD5

    43ea2e8224f20e16c652c6a831864fa0

  • SHA1

    4a2f52d5d286e40f1e920c8359d5410b974b3ac6

  • SHA256

    1cefb6e3871357bd629d39e4533a04c19ad3418807eae9487d5fb8c28bdfc202

  • SHA512

    21ccea5a109964d0161ef447f8dc2304229e5cea24dfe9bbbab038dd7a8d51aff6a75e63e697d96be249b6a65ae4e6f86f3f93555fde528e8176a258d656cb01

  • SSDEEP

    49152:k1hZX5SoqzWBLxMvFTjzuP07gs4u7dWen2U2d3DOalWi2tlE/D8Z6XlQxLtEe+U:ehhBLxUvtk5u7pnX2d3DvytlEbZ6

Malware Config

Targets

    • Target

      1cefb6e3871357bd629d39e4533a04c19ad3418807eae9487d5fb8c28bdfc202N

    • Size

      3.2MB

    • MD5

      43ea2e8224f20e16c652c6a831864fa0

    • SHA1

      4a2f52d5d286e40f1e920c8359d5410b974b3ac6

    • SHA256

      1cefb6e3871357bd629d39e4533a04c19ad3418807eae9487d5fb8c28bdfc202

    • SHA512

      21ccea5a109964d0161ef447f8dc2304229e5cea24dfe9bbbab038dd7a8d51aff6a75e63e697d96be249b6a65ae4e6f86f3f93555fde528e8176a258d656cb01

    • SSDEEP

      49152:k1hZX5SoqzWBLxMvFTjzuP07gs4u7dWen2U2d3DOalWi2tlE/D8Z6XlQxLtEe+U:ehhBLxUvtk5u7pnX2d3DvytlEbZ6

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks